Categories
Uncategorized

Game studies. Issue 1, 2001.

Game studies. Issue 1, 2001. the international journal of computer game research

Categories
Uncategorized

Be takeover imminent Be has

Be takeover imminent

Be has found a buyer for its operating system and the development team behind, sources close to the company have told The Register.

Hope whoever it is they do something that I wil actually be able to get my hands on. Been wanting to actually use Be OS for years.

Categories
Uncategorized

Be takeover imminent Be has

Be takeover imminent

Be has found a buyer for its operating system and the development team behind, sources close to the company have told The Register.

Hope whoever it is they do something that I wil actually be able to get my hands on. Been wanting to actually use Be OS for years.

Categories
Uncategorized

Top X, 869 now, Things

Top X, 869 now, Things Programmers Are Least Likely To Say from the Dilbert Zone

Categories
Uncategorized

Top X, 869 now, Things

Top X, 869 now, Things Programmers Are Least Likely To Say from the Dilbert Zone

Categories
Uncategorized

BeerLog a Pint of view

BeerLog a Pint of view

Categories
Uncategorized

BeerLog a Pint of view

BeerLog a Pint of view

Categories
Uncategorized

Initial release of Herbivore

Initial release of Herbivore software

Herbivore is similar to GnuPG or PGP, except that it is intended to operate totally automatically. So if you and me both have a Herbivore-enabled email client, any email that travels between us will automatically be encrypted; Herbivore will automatically generate public/private keypairs, exchange the public keys, encrypt on transmission and decrypt on receipt.

Categories
Uncategorized

Initial release of Herbivore

Initial release of Herbivore software

Herbivore is similar to GnuPG or PGP, except that it is intended to operate totally automatically. So if you and me both have a Herbivore-enabled email client, any email that travels between us will automatically be encrypted; Herbivore will automatically generate public/private keypairs, exchange the public keys, encrypt on transmission and decrypt on receipt.

Categories
Uncategorized

A Comparison of Popular Online

A Comparison of Popular Online Fonts: Which is Best and When? Me thinks tiggersol will find this one intresting.